Operating System Security : Security Policies
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 7
Abstract
Security is the primary concern in the modern world. The main focus of this paper is the security of our information and its supporting infrastructure. By keeping the computer system secure we can provide the security to the computerized information and vital to that is the operating system. In order to have a secure operating system it must be supported by the suitable computer architecture. If the technology from which the OS is built and on which it is supported is not secure then there is no confidentiality in the security of the OS and of the information it maintains for the users. This is the short overview of OS Security. In this paper we will discuss about the security policies that can be supported by the system.
Authors and Affiliations
Sarika Choudhary
Automated Feedback System for Multimedia in Multiprocessors
In spite of many real times scheduling algorithms available it is not clear that these scheduling algorithms support fully the problems in the real time system in multiprocessors. There are certain “open loop” algorithm...
A Clustering approach in Mobile Ad-hoc Networks Routing
A mobile ad-hoc network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. MANETs are restricted to a local area of wireless devices, while others may be connected to the I...
A Survey of Cyber Crimes
Now a days Cyber Crime is the most significant challenges in India .Cyber Crimes are generally referred as criminal activities that use computers or networks. It can range from fraud to unsolicited emails (spam). It can...
Optimum Design of Composite Plates under Thermal Buckling Loads using Imperialist Competitive Algorithm
Thermal buckling loads of laminated composite plates are maximized for a given total thickness. Fiber directions and relative thickness of layers are considered as design variables. Analysis of buckling temperature is ca...
Comparative study about Digital Image Watermarking Using DCT and robustness testing of technique
In the today’s world of rapidly growing internet services (Commercial and educational), security always comes in picture even at low level. Same way in the field of Information Technology and Computer Science and Enginee...